input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Google Chrome - Out-of-Bounds Access in RegExp Stubs | This is a dos exploit for multiple platform. Description: Google Chrome - Out-of-Bounds Access in RegExp Stubs. Author: Google Security Research |
Analyze the security implications of: Google Chrome - Out-of-Bounds Access in RegExp Stubs | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ClassSystem 2.0/2.3 - 'class/ApplyDB.php' Unrestricted Arbitrary File Upload / Arbitrary Code Execution | This is a webapps exploit for php platform. Description: ClassSystem 2.0/2.3 - 'class/ApplyDB.php' Unrestricted Arbitrary File Upload / Arbitrary Code Execution. Author: Unohope |
Analyze the security implications of: ClassSystem 2.0/2.3 - 'class/ApplyDB.php' Unrestricted Arbitrary File Upload / Arbitrary Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: W3M 0.1/0.2 - Malformed MIME Header Buffer Overflow | This is a remote exploit for freebsd platform. Description: W3M 0.1/0.2 - Malformed MIME Header Buffer Overflow. Author: White_E |
Analyze the security implications of: W3M 0.1/0.2 - Malformed MIME Header Buffer Overflow | This exploit targets freebsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: KikChat - Local File Inclusion / Remote Code Execution | This is a webapps exploit for php platform. Description: KikChat - Local File Inclusion / Remote Code Execution. Author: cr4wl3r |
Analyze the security implications of: KikChat - Local File Inclusion / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iScripts EasyCreate 3.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: iScripts EasyCreate 3.0 - Multiple Vulnerabilities. Author: Bikramaditya Guha |
Analyze the security implications of: iScripts EasyCreate 3.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dell Security Management Server <1.9.0 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Dell Security Management Server <1.9.0 - Local Privilege Escalation. Author: Amirhossein Bahramizadeh |
Analyze the security implications of: Dell Security Management Server <1.9.0 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Sun Java SE November 2009 - Multiple Vulnerabilities (2) | This is a remote exploit for multiple platform. Description: Sun Java SE November 2009 - Multiple Vulnerabilities (2). Author: Tometzky |
Analyze the security implications of: Sun Java SE November 2009 - Multiple Vulnerabilities (2) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ManageEngine Service Desk 10.0 - Cross-Site Scripting | This is a webapps exploit for java platform. Description: ManageEngine Service Desk 10.0 - Cross-Site Scripting. Author: Felipe Molina |
Analyze the security implications of: ManageEngine Service Desk 10.0 - Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Squiggle 1.7 - SVG Browser Java Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Squiggle 1.7 - SVG Browser Java Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Squiggle 1.7 - SVG Browser Java Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CodeMeter 6.50 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: CodeMeter 6.50 - Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: CodeMeter 6.50 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Meto Forum 1.1 - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Meto Forum 1.1 - Multiple SQL Injections. Author: U238 |
Analyze the security implications of: Meto Forum 1.1 - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Webmin 1.996 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for linux platform. Description: Webmin 1.996 - Remote Code Execution (RCE) (Authenticated). Author: Emir Polat |
Analyze the security implications of: Webmin 1.996 - Remote Code Execution (RCE) (Authenticated) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GeekLog 1.4.0sr3 - 'f(u)ckeditor' Remote Code Execution | This is a webapps exploit for php platform. Description: GeekLog 1.4.0sr3 - 'f(u)ckeditor' Remote Code Execution. Author: rgod |
Analyze the security implications of: GeekLog 1.4.0sr3 - 'f(u)ckeditor' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AirControl 1.4.2 - PreAuth Remote Code Execution | This is a webapps exploit for hardware platform. Description: AirControl 1.4.2 - PreAuth Remote Code Execution. Author: 0xd0ff9 |
Analyze the security implications of: AirControl 1.4.2 - PreAuth Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AIOCP 1.3.x - 'cp_users_online.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'cp_users_online.php' Cross-Site Scripting. Author: laurent gaffie |
Analyze the security implications of: AIOCP 1.3.x - 'cp_users_online.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AZADMIN CMS 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: AZADMIN CMS 1.0 - SQL Injection. Author: felipe andrian |
Analyze the security implications of: AZADMIN CMS 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: xglance-bin 11.00 - Privilege Escalation | This is a local exploit for linux platform. Description: xglance-bin 11.00 - Privilege Escalation. Author: redtimmysec |
Analyze the security implications of: xglance-bin 11.00 - Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JiRo's Banner System 2.0 - 'login.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: JiRo's Banner System 2.0 - 'login.asp' Multiple SQL Injections. Author: Aria-Security Team |
Analyze the security implications of: JiRo's Banner System 2.0 - 'login.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ExifTool 12.23 - Arbitrary Code Execution | This is a local exploit for linux platform. Description: ExifTool 12.23 - Arbitrary Code Execution. Author: UNICORD |
Analyze the security implications of: ExifTool 12.23 - Arbitrary Code Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenBSD 3.3/3.4 - 'sysctl' Local Denial of Service | This is a dos exploit for openbsd platform. Description: OpenBSD 3.3/3.4 - 'sysctl' Local Denial of Service. Author: anonymous |
Analyze the security implications of: OpenBSD 3.3/3.4 - 'sysctl' Local Denial of Service | This exploit targets openbsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: Joomla! 1.5 Beta1/Beta2/RC1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! 1.5 Beta1/Beta2/RC1 - SQL Injection. Author: Silentz |
Analyze the security implications of: Joomla! 1.5 Beta1/Beta2/RC1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board (IP.Board) 2.0.3/2.1 - 'Act' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 2.0.3/2.1 - 'Act' Cross-Site Scripting. Author: arron ward |
Analyze the security implications of: Invision Power Board (IP.Board) 2.0.3/2.1 - 'Act' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Symantec Mobile Encryption for iPhone 2.1.0 - 'Server' Denial of Service (PoC) | This is a dos exploit for ios platform. Description: Symantec Mobile Encryption for iPhone 2.1.0 - 'Server' Denial of Service (PoC). Author: Luis Martínez |
Analyze the security implications of: Symantec Mobile Encryption for iPhone 2.1.0 - 'Server' Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Cauldron Chaser 1.4/1.5 - Remote Denial of Service (2) | This is a dos exploit for multiple platform. Description: Cauldron Chaser 1.4/1.5 - Remote Denial of Service (2). Author: Luigi Auriemma |
Analyze the security implications of: Cauldron Chaser 1.4/1.5 - Remote Denial of Service (2) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: bgERP v22.31 (Orlovets) - Cookie Session vulnerability & Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: bgERP v22.31 (Orlovets) - Cookie Session vulnerability & Cross-Site Scripting (XSS). Author: nu11secur1ty |
Analyze the security implications of: bgERP v22.31 (Orlovets) - Cookie Session vulnerability & Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 Website System 0.554 - HTML Injection | This is a webapps exploit for php platform. Description: e107 Website System 0.554 - HTML Injection. Author: Pete Foster |
Analyze the security implications of: e107 Website System 0.554 - HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jax Guestbook 3.31/3.50 - 'jax_Guestbook.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Jax Guestbook 3.31/3.50 - 'jax_Guestbook.php' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: Jax Guestbook 3.31/3.50 - 'jax_Guestbook.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Best Student Result Management System v1.0 - Multiple SQLi | This is a webapps exploit for php platform. Description: Best Student Result Management System v1.0 - Multiple SQLi. Author: nu11secur1ty |
Analyze the security implications of: Best Student Result Management System v1.0 - Multiple SQLi | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari 3.1 - Window.setTimeout Variant Content Spoofing | This is a remote exploit for osx platform. Description: Apple Safari 3.1 - Window.setTimeout Variant Content Spoofing. Author: Juan Pablo Lopez Yacubian |
Analyze the security implications of: Apple Safari 3.1 - Window.setTimeout Variant Content Spoofing | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! Component Huru Helpdesk - SQL Injection (2) | This is a webapps exploit for php platform. Description: Joomla! Component Huru Helpdesk - SQL Injection (2). Author: Amine_92 |
Analyze the security implications of: Joomla! Component Huru Helpdesk - SQL Injection (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ATutor 1.x - 'print.php?section' Remote File Inclusion | This is a webapps exploit for php platform. Description: ATutor 1.x - 'print.php?section' Remote File Inclusion. Author: Andreas Sandblad |
Analyze the security implications of: ATutor 1.x - 'print.php?section' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Seacms 11.1 - 'file' Local File Inclusion | This is a webapps exploit for multiple platform. Description: Seacms 11.1 - 'file' Local File Inclusion. Author: j5s |
Analyze the security implications of: Seacms 11.1 - 'file' Local File Inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FlatNuke 2.5.x - 'referer.php' Crafted Referer Arbitrary PHP Code Execution | This is a webapps exploit for php platform. Description: FlatNuke 2.5.x - 'referer.php' Crafted Referer Arbitrary PHP Code Execution. Author: SecWatch |
Analyze the security implications of: FlatNuke 2.5.x - 'referer.php' Crafted Referer Arbitrary PHP Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.